Remove Education Remove Information Security Remove Nonprofit Remove Virtualization
article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

Security awareness and how you talk about cybersecurity. Our guests included: Cindy Liebes, Chief Program Officer for the Cybercrime Support Network; Jake Wilson, Security Awareness Evangelist for Western Governors University; and Gretel Egan, Senior Security Awareness and Training Strategist for Proofpoint.

Survey 85
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

When I look at my resume, like it's pretty strong, you know, both in terms of my education. I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here.

Study 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

When I look at my resume, like it's pretty strong, you know, both in terms of my education. I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Vamosi: So what am I missing here.

Study 40
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. There is other ones such as the car hacking village and stuff but so the the API says village started several years ago at DEF CON to bring education awareness and exposure to industrial control systems technology security.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? Vamosi: And that’s just a drop in the ocean for how many more information security people are needed today.